
Assets and Threats: Quiz 4
Authored by John Coder
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
29 questions
Show all answers
1.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Hash values are primarily used as a way to determine the int___________ of files and applications. Hashes also keep information confi____________ because they can't be decrypted.
(a)
2.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Data integrity relates to the accuracy and consistency of information. This is known as non-repud_____________, the concept that authenticity of information can't be de___________.
(a)
3.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Hash values are primarily used as a way to determine the int___________ of files and applications. Hashes also keep information confi____________ because they can't be decrypted.
(a)
4.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
To avoid the risk of hash collisions, functions that generated longer values were needed. MD5's shortcomings gave way to a new group of functions known as the sec________ has_________ algor_________, or SHAs.
(a)
5.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Five fun (a) make up the SHA family of algorithms:
SHA-1
SHA-224
SHA-256
SHA-384
SHA-512
6.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
A rainbow table is a file of pre-generated hash values and their associated plaintext. They’re like dictio (a) of weak passwords. Attackers capable of obtaining an organization’s password database can use a rainbow table to compare them against all possible values.
7.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Salting is an additional safeguard that's used to strengthen hash functions. A salt is a random str (a) of characters that's added to data before it's hashed. The additional characters produce a more unique hash value, making salted data resilient to rainbow table attacks.
For example, a database containing passwords might have several hashed entries for the password "password." If those passwords were all salted, each entry would be completely different. That means an attacker using a rainbow table would be unable to find matching values for "password" in the database.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?